Network Security Term Project 2002 Fall Network Security Chul Joon Choi 2002. 10.08 Prof. Kwang jo Kim Network Security Term Project (2002 Fall) 발표자 :

Slides:



Advertisements
Similar presentations
E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
Advertisements

Rennes, 24/10/2014 Cristina Onete CIDRE/ INRIA Privacy in signatures. Hiding in rings, hiding in groups.
BY JYH-HAW YEH COMPUTER SCIENCE DEPT. BOISE STATE UNIVERSITY Proxy Credential Forgery Attack to Two Proxy Signcryption Schemes.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Lecture 23 Internet Authentication Applications
Broadcast Encryption and Traitor Tracing Jin Kim.
1 An Efficient Strong Key-Insulated Signature Scheme and Its Application 5 th European PKI Workshop June 16-17, 2008 NTNU, Trondheim, Norway Go Ohtake.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes Author: Stanislaw Jarecki and Xiaomin Liu University of California, Irvine From:
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Identity Base Threshold Proxy Signature Jing Xu, Zhenfeng Zhang, and Dengguo Feng Form eprint Presented by 魏聲尊.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Bob can sign a message using a digital signature generation algorithm
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Basel Alomair, Krishna Sampigethaya, and Radha Poovendran University of Washington TexPoint fonts used in EMF.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
Chapter 4: Intermediate Protocols
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Anonymous Authentication in Group Course Title: Network Security Faculty : Kwangjo Kim Jongseong Kim.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Lecture 8 Overview. Secure Hash Algorithm (SHA) SHA SHA SHA – SHA-224, SHA-256, SHA-384, SHA-512 SHA-1 A message composed of b bits.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
IM NTU Distributed Information Systems 2004 Security -- 1 Security Yih-Kuen Tsay Dept. of Information Management National Taiwan University.
1 一個新的代理簽章法 A New Proxy Signature Scheme 作 者 : 洪國寶, 許琪慧, 郭淑娟與邱文怡 報 告者 : 郭淑娟.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Cryptanalysis of Some Proxy Signature Schemes without Certificates Wun-She Yap, Swee-Huay Heng Bok-Min Goi Multimedia University.
Prepared by Dr. Lamiaa Elshenawy
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
Cryptography and Network Security Chapter 14
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
A New Provably Secure Certificateless Signature Scheme Date: Reporter:Chien-Wen Huang 出處 :2008 IEEE International Conference on Communications.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
ICICS2002, Singapore 1 A Group Signature Scheme Committing the Group Toru Nakanishi, Masayuki Tao, and Yuji Sugiyama Dept. of Communication Network Engineering.
Real time Stock quotes by web Service and Securing XML for Web Services security. Bismita Srichandan
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
Cryptography and Network Security Chapter 13
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Study on The Secure Key-Evolving Protocols Kim Joong Man
Digital signatures.
Lecture 6: Digital Signature
Published in 2016 International Computer Symposium (ICS) Authors
Lihua Liu† Zhengjun Cao‡
Presentation transcript:

Network Security Term Project 2002 Fall Network Security Chul Joon Choi Prof. Kwang jo Kim Network Security Term Project (2002 Fall) 발표자 : 최철준 학 번 : Class : Network Security Professor : Kwang-jo Kim

Network Security Term Project 2002 Fall Network Security Chul Joon Choi Prof. Kwang jo Kim Topic : Forward Secrecy and It’s Application Subject : Forward Secrecy in Proxy Signature

Network Security Term Project 2002 Fall Network Security Chul Joon Choi Prof. Kwang jo Kim Table of Contents 1.Introduction 2.Main subject of this project - What is Proxy Signature? - What is Forward Secrecy 3. Conclusion

Network Security Term Project 2002 Fall Network Security Chul Joon Choi Prof. Kwang jo Kim What is Proxy Signature  Proxy Signature scheme - Delegation of signing capability : An original signer delegates her signing capability to a proxy signer - Proxy signing : The proxy signer creates a proxy signature on behalf of the original signer Referenced by Byong cheon Lee Lecture note

Network Security Term Project 2002 Fall Network Security Chul Joon Choi Prof. Kwang jo Kim What is Proxy Signature (cont..)  Security Requirements 1. Verifiability 2. Strong unforgeability 3. Strong Indentifiability 4. Strong Undeniability 5. Prevention of Misuse

Network Security Term Project 2002 Fall Network Security Chul Joon Choi Prof. Kwang jo Kim [BC93] B.C Neuman, “Proxy-based authorization and accounting for distributed systems.” Proc 13 th International Conference on Distributed Computing Systems (1993) [MUO96] M. Mambo, K. Usuda, E.Okamoto, “Proxy Signature: Delegation of the Power to Sign Messages”, IEICE Trans. Fundamentals, E79-A:9 (1996) [KPW97] S.Kim, S.Park, and D.Won, “Proxy Signature, revisited”, Proc of International Conference on Information and Communication Security (1997) [LKK01A] B. Lee, H.Kim, K.Kim, “Strong Proxy signature and its Applications.” Proc of SCIS (2001) [LKK01B] B. Lee, H.Kim, K.Kim, “Secure Mobile Agent using Strong Non-designated Proxy Signature.” Australasian Conference on Information Security and Privacy (2001) Related Work

Network Security Term Project 2002 Fall Network Security Chul Joon Choi Prof. Kwang jo Kim Schnorr-based Proxy Signature Original Signer’s Parameter Verification Proxy Signer Key Generation Referenced by Byong cheon Lee Lecture note

Network Security Term Project 2002 Fall Network Security Chul Joon Choi Prof. Kwang jo Kim Schnorr-based Proxy Signature Proxy Signer Verifier Referenced by Byong cheon Lee Lecture note

Network Security Term Project 2002 Fall Network Security Chul Joon Choi Prof. Kwang jo Kim What is Forward Secrecy  Definition of Forward Secrecy - Forward Secrecy : Compromise of the current secret key does not enable an adversary to forge signatures pertaining to the past [Bellare et. al.]

Network Security Term Project 2002 Fall Network Security Chul Joon Choi Prof. Kwang jo Kim Ross Anderson, “Two Remarks on Public Key Cryptology.” Invited lecture, CCCS ’97. M. Bellare and S. Miner, “A Forward-Secure Digital Signature Scheme.” Crypto ’99. J. Katz, “A Forward-Secure Public-Key Encryption Scheme.” Crypto 02’ rump session. U. M.Maurer, Y. Yacobi, “A Non-interactive Public-Key Distribution.” Designs, Codes and Cryptography v9, no 3 pp Related Work

Network Security Term Project 2002 Fall Network Security Chul Joon Choi Prof. Kwang jo Kim Relationship b/w Proxy Signature and Forward secrecy  People are not concerned about key destroying in Proxy signature.  The key revocation and escrow problem is also important issue in proxy signature.  Some researchers worried about forgery of original signer but it is also possible that proxy signer can recreate forged proxy signature after the key was revoked.

Network Security Term Project 2002 Fall Network Security Chul Joon Choi Prof. Kwang jo Kim Conclusion and Future Work - Survey the Proxy Signature and Forward Secrecy - Bring up the Problem in Proxy Signature - Key revocation problem & proxy signer’s forgery - How to merge between Proxy Signature and Forward Secrecy